Domain 2 of 5

Threats, Vulnerabilities & Mitigations (22%)

Domain 2: Threats, Vulnerabilities, and Mitigations

Exam Weight: 22% | Second highest weighted domain


Domain Overview

Domain 2 focuses on understanding the threat landscape—who attacks systems, how they attack, what vulnerabilities they exploit, and how to defend against them. This is the second-largest domain on the exam and requires both theoretical knowledge and practical understanding of real-world attack scenarios.


Learning Objectives

After completing this domain, you should be able to:


Lessons in This Domain

| Lesson | Topic | Objectives Covered |

|--------|-------|-------------------|

| 01_threat_actors.md | Threat Actors and Motivations | 2.1 |

| 02_attack_surfaces.md | Attack Surfaces and Vectors | 2.2 |

| 03_vulnerabilities.md | Vulnerability Types | 2.3 |

| 04_malicious_activity.md | Indicators of Malicious Activity | 2.4 |

| 05_mitigation_techniques.md | Mitigation Techniques | 2.5 |


Key Concepts at a Glance

Threat Actor Types

| Actor Type | Resources | Sophistication | Primary Motivation |

|------------|-----------|----------------|-------------------|

| Nation-State | Very High | Very High | Espionage, Warfare |

| Organized Crime | High | High | Financial Gain |

| Hacktivists | Medium | Medium | Political/Social Change |

| Insider Threats | Varies | Varies | Revenge, Financial Gain |

| Unskilled Attackers | Low | Low | Curiosity, Attention |

Attack Vector Categories

| Vector Type | Examples |

|-------------|----------|

| Message-Based | Email phishing, SMS (SMiShing), IM attacks |

| Network-Based | Open ports, default credentials, wireless attacks |

| Supply Chain | Compromised vendors, malicious updates |

| Social Engineering | Impersonation, pretexting, phishing |

| Physical | USB drops, RFID cloning, tailgating |

Vulnerability Categories

| Category | Examples |

|----------|----------|

| Application | Buffer overflow, race conditions, injection flaws |

| Web-Based | SQLi, XSS, CSRF, SSRF |

| Operating System | Unpatched systems, misconfigurations |

| Hardware/Firmware | EOL devices, rootkits, supply chain tampering |

| Cloud-Specific | Misconfigurations, shared responsibility gaps |

| Mobile | Sideloading, jailbreaking, rooting |

Malware Types

| Malware | Behavior |

|---------|----------|

| Virus | Requires host file, spreads when executed |

| Worm | Self-replicating, spreads across networks automatically |

| Trojan | Disguised as legitimate software |

| Ransomware | Encrypts data, demands payment |

| Rootkit | Hides at kernel level, very difficult to detect |

| RAT | Provides remote backdoor access |

| Spyware/Keylogger | Monitors and steals information |


Exam Tips for Domain 2

⚠️ High-Priority Topics:

⚠️ Common Exam Traps:

⚠️ Scenario Question Strategy:

When given an attack scenario, identify:

  1. WHO is the threat actor? (motivation, resources)
  2. WHAT vector did they use? (how did they get in)
  3. WHAT vulnerability did they exploit? (what weakness)
  4. WHAT indicators show the attack? (evidence/artifacts)
  5. HOW should it be mitigated? (appropriate controls)

Study Checklist

Objective 2.1: Threat Actors

Objective 2.2: Attack Surfaces and Vectors

Objective 2.3: Vulnerabilities

Objective 2.4: Malicious Activity

Objective 2.5: Mitigation Techniques


Quick Reference: Attack Chain

Reconnaissance → Weaponization → Delivery → Exploitation → Installation → C2 → Actions
     ↓               ↓              ↓            ↓              ↓          ↓       ↓
  Scanning      Create payload   Phishing    Exploit vuln   Backdoor   Beaconing  Exfil
  OSINT         Malware dev      USB drop    Buffer overflow Rootkit   Persistence Data theft
  Social eng    Trojanize app    Watering    Injection      RAT       Lateral mov Destruction

External Resources


Continue to Lesson 1: Threat Actors →

← Previous Domain 2 of 5 Next →